You are on page 1of 4

1/24/24, 11:35 PM Information and Network Security - PostQuiz: Attempt review


 Dashboard / Primer 2.0 - Infrastructure Security / Stage 1 / Security & Cybersecurity fundamentals / Information and Network Security

Quiz review
Started on Wednesday, 24 January 2024, 11:31 PM
State Finished
Completed on Wednesday, 24 January 2024, 11:35 PM
Time taken 4 mins 13 secs
Marks 9.00/10.00
Grade 90.00 out of 100.00

Question 1
Correct

Mark 1.00 out of 1.00

A network administrator observes a sudden, unusually high volume of traffic to a specific server, causing it to become unresponsive. What type of network
attack might this be indicative of?

Network Attack
46684
Man-in-the-Middle Attack
DDoS Attack
Phishing Attack

The correct answer is: DDoS Attack

Question 2

46684
Correct

Mark 1.00 out of 1.00

In a company, a firewall, antivirus software, and intrusion detection system (IDS) are examples of which cybersecurity components?

Security Measures
Security Procedures
Security Policies
Security Protocols

46684
The correct answer is: Security Measures


https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1057120&cmid=8052 1/4
1/24/24, 11:35 PM Information and Network Security - PostQuiz: Attempt review

Question 3
Incorrect

Mark 0.00 out of 1.00

A user receives an email that appears to be from their bank, requesting personal and financial information. What type of cyber threat does this email likely
represent?

Social Engineering Attack


Phishing Attack 
Man-in-the-Middle Attack
Network Attack

The correct answer is: Social Engineering Attack

Question 4
Correct

Mark 1.00 out of 1.00

46684
An organization wants to ensure that sensitive customer data is encrypted and stored securely. What aspect of information security does this relate to?

Data Encryption
Data Classification
Data Loss Prevention
Data Backup

The correct answer is: Data Encryption

Question 5
46684
Correct

Mark 1.00 out of 1.00

Which of the following is NOT a typical information security policy in an organization?

Security Policies
Security Protocols
Security Procedures
Employee Privacy Policy

46684
The correct answer is: Employee Privacy Policy


https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1057120&cmid=8052 2/4
1/24/24, 11:35 PM Information and Network Security - PostQuiz: Attempt review

Question 6
Correct

Mark 1.00 out of 1.00

In the context of information security for supplier relationships, what does the acronym "SLA" stand for?

Security Layer Assessment


Service Level Agreement
Supplier Liability Assurance
Supplier Liaison Agreement

The correct answer is: Service Level Agreement

Question 7
Correct

Mark 1.00 out of 1.00

46684
What is the term for the unauthorized access to a network in order to gather information and potentially exploit vulnerabilities?

Network Attack
Firewall Breach
Network Scanning
Data Exfiltration

The correct answer is: Network Scanning

Question 8
Correct
46684
Mark 1.00 out of 1.00

What network security terminology is used to describe a technique in which an attacker intercepts and possibly alters communication between two parties
without their knowledge?

Man-in-the-Middle (MiTM)
Firewall Breach
Phishing Attack

46684
Network Attack

The correct answer is: Man-in-the-Middle (MiTM)


https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1057120&cmid=8052 3/4
1/24/24, 11:35 PM Information and Network Security - PostQuiz: Attempt review

Question 9
Correct

Mark 1.00 out of 1.00

Which network security concept is primarily concerned with ensuring that data is not intercepted or altered during transmission?

Intrusion Detection
Data Encryption
Firewall Configuration
User Authentication

The correct answer is: Data Encryption

Question 10
Correct

Mark 1.00 out of 1.00

46684
Sarah receives an email from an unknown sender with a suspicious attachment. She is unsure if she should open it. What type of cybersecurity threat is this
scenario related to?

Firewall
Malware
Antivirus
Goodware

The correct answer is: Malware

46684
◄ Network Security

Jump to...

Operations Security and Cryptography - Bases of Web Technology - PreQuiz ►

46684


https://accenturelearning.tekstac.com/mod/quiz/review.php?attempt=1057120&cmid=8052 4/4

You might also like